News Items

  • news

    Visible to the public "Germany Unveils Plan to Tackle Cyberattacks on Satellites"

    The German Federal Office for Information Security (BSI) has released an IT baseline protection profile for space infrastructure in response to concerns that attackers may turn their attention to the sky. The document resulted from work by Airbus Defence and Space, the German Space Agency at the German Aerospace Center (DLR), and BSI, among others. The focus is on defining minimum requirements for cybersecurity for satellites. The guide categorizes satellite mission protection requirements from "Normal" to "Very High," with the goal of covering as many missions as possible. It is also intended to cover information security from satellite manufacturing to satellite operation. The "Normal" category corresponds to limited and manageable damage. "High" refers to damage that significantly limits the operation of the satellite system. The attack could cause a shutdown and reach an existentially threatening, catastrophic extent for the operator or the manufacturer, according to "Very High." The attack surface area of satellites grows as they become smarter. Furthermore, disrupting constellations and communications may be another front for conflict. This article continues to discuss the BSI document and the growing importance of bolstering cybersecurity in space.

    The Register reports "Germany Unveils Plan to Tackle Cyberattacks on Satellites"

  • news

    Visible to the public "AstraLocker Ransomware Shuts Down and Releases Decryptors"

    The threat actor behind the AstraLocker ransomware claims they are ceasing operations and intend to transition to cryptojacking. The creator of the ransomware uploaded a ZIP archive containing AstraLocker decryptors to the VirusTotal malware detection service. After downloading the archive and testing one of the decryptors on files encrypted by a recent AstraLocker operation, Bleeping Computer was able to confirm that the decryptors are reliable and functional. However, other decryptors in the archive are likely designed to decrypt files encrypted in earlier campaigns. The developer did not explain why AstraLocker was shut down, but it was probably because of the sudden attention the operation received as a result of recent reports, which put it in the sights of law enforcement. Emsisoft, a software provider known for assisting ransomware victims with data decryption, is currently developing a universal decryptor for AstraLocker ransomware. This article continues to discuss the close down of the AstraLocker ransomware and the release of decryptors for it.

    Bleeping Computer reports "AstraLocker Ransomware Shuts Down and Releases Decryptors"

  • news

    Visible to the public "MITRE Releases ATT&CK Search Extension for Chrome"

    MITRE's Center for Threat Informed Defense now provides a free Chrome browser extension called ATT&CK Powered Suit that enables instant searching of the ATT&CK framework knowledge base by right-clicking on a term. Mark Haase and Jon Baker, the chief engineer and director of research of the Center for Threat Informed Defense, pointed out that the MITRE ATT&CK community spends too much time copying and pasting text from one location to another to accomplish simple tasks, such as looking up ATT&CK technique IDs, linking to a software page, or simply finding a term from the most recent threat intelligence report in the ATT&CK knowledge base. ATT&CK Powered Suit simplifies the search process in various ways, including creating an overlay capable of providing search results as a user types, directing users to several selectable categories of information on the MITRE website, and sending a user off-site when necessary. This article continues to discuss MITRE's ATT&CK Powered Suit browser extension for Chrome.

    SC Magazine reports "MITRE Releases ATT&CK Search Extension for Chrome"

  • news

    Visible to the public "UK Councils and Hospitals Vulnerable to Cyber Hackers"

    An investigation conducted by ITV News into cybersecurity at UK public services revealed a significant disparity in defense budgets, hundreds of website vulnerabilities, and staff email addresses and passwords at one council posted in full online. The researchers found that one UK council spent only PS32,000 yearly on cybersecurity. By comparison, another council with a smaller population had an annual cybersecurity budget of PS1m, over 30 times larger. The investigation also revealed that one hospital had only put aside PS10,000 yearly towards cybersecurity. The researchers noted that the cyberattacks had caused real-life problems, including residents forced to leave their homes, canceled hospital operations, incorrect benefit payments, overcharged tax bills, house sales falling through, repairs to council houses not being carried out, inability to apply for council housing, and sensitive data leaked online. Many researchers agreed that there is a lack of clarity and standards for public services regarding cybersecurity. In October of last year, it was reported that UK councils had been hit by a staggering 33,645 data breaches caused by human error in the past five years.

    Infosecurity reports: "UK Councils and Hospitals Vulnerable to Cyber Hackers"

  • news

    Visible to the public "British Army Social Media Accounts Hijacked"

    It was recently discovered that a malicious third party compromised the British army's Twitter and YouTube accounts and used them to direct visitors to cryptocurrency scams. After discovering the accounts were hacked, it took 4 hours to regain control of them. The Ministry of Defence (MoD) stated that hackers posted multiple promotional links to various crypto and NFT scams, including a likely phishing link to a fake mint of The Possessed NFT collection. The MoD also noted that on YouTube, the hackers rebranded the entire account to resemble investment firm Ark Invest, posting live stream videos featuring celebs like Elon Musk and Jack Dorsey. The videos were used to promote QR codes for viewers to send their crypto to, claiming that doing so would result in them receiving double their investment back. Separate research from last November found that YouTube Live scams, including fake crypto giveaways, made fraudsters almost $9m in October alone.

    Infosecurity reports: "British Army Social Media Accounts Hijacked"

  • news

    Visible to the public "OpenSea NFT Marketplace Faces Insider Hack"

    OpenSea, the largest nonfungible token (NFT) marketplace with nearly 2 million users, revealed that an employee of one of its email vendors, Customer.io, gained access to and downloaded the company's email list. It also stated that anyone who has previously shared their email address with the platform should assume they are affected. Users are asked to be on the lookout for malicious actors trying to contact them using an email address that looks similar to the company's official email domain, 'opensea.io.' According to Paul Laudanski, head of threat intelligence at the email security firm Tessian, insider abuse is inherently difficult to spot. It is more difficult to detect when the individual is an authorized user. Therefore, he advises all organizations to investigate third-party risk management protocols and to be aware of how and where data is stored. Given that the OpenSea email list is a potentially lucrative dataset for cybercriminals, the intrusion was most likely financially motivated. The millions of customer email addresses will attract threat actors looking to perform widespread phishing attacks. Karl Steinkamp, director at Coalfire, warns that attackers may also utilize the email list to steal NFTs from unsuspecting OpenSea customers. This article continues to discuss the potential impact of the insider hack faced by the OpenSea NFT marketplace.

    Dark Reading reports "OpenSea NFT Marketplace Faces Insider Hack"

  • news

    Visible to the public "PCI DSS 4.0 Released, Addresses Emerging Threats and Technologies"

    The PCI Security Standards Council (PCI SSC) has released version 4.0 of the PCI Data Security Standard (PCI DSS). PCI DSS is a global standard that provides a baseline of technical and operational requirements designed to protect account data. PCI DSS is a global standard that establishes a baseline of technical and operational requirements for account data protection. The current version of PCI DSS, 3.2.1, will remain active for two years until it is retired on March 31, 2024, to give organizations time to understand the changes in the new version and implement any necessary updates. Organizations may assess to either PCI DSS 4.0 or PCI DSS 3.2.1 once assessors have completed PCI DSS 4.0 training. The standard also gives organizations more time to implement many of the new requirements. The standard was modified in response to feedback from the global payments industry. Over the course of three years, more than 200 organizations provided more than 6,000 items of feedback to ensure that the standard remains relevant in the complex, everchanging landscape of payment security. Examples of changes include updated firewall terminology for network security controls, the expansion of Requirement 8 to implement multi-factor authentication (MFA) for all access into the cardholder data environment, the addition of targeted risk analyses to allow entities the flexibility to define how frequently they perform certain activities, and more. This article continues to discuss PCI DSS 4.0 changes.

    Help Net Security reports "PCI DSS 4.0 Released, Addresses Emerging Threats and Technologies"

  • news

    Visible to the public "Researchers Share Techniques to Uncover Anonymized Ransomware Sites on Dark Web"

    Researchers have released details on the steps ransomware actors have taken to conceal their true identity online, as well as the location of their web server infrastructure. According to Cisco Talos researcher Paul Eubanks, most ransomware operators host their ransomware operations sites in countries other than their own, such as Sweden, Germany, and Singapore. When they connect to their ransomware web infrastructure for remote administration tasks, they use Virtual Private Server (VPS) hop-points as a proxy to hide their true location. The use of the TOR network and DNS proxy registration services to provide an additional layer of anonymity for their illegal operations is also prominent. However, the cybersecurity firm revealed that it was able to identify TOR hidden services hosted on public IP addresses, some of which are previously unknown infrastructure associated with the DarkAngels, Snatch, Quantum, and Nokoyawa ransomware groups, by taking advantage of the threat actors' operational security missteps and other techniques. This article continues to discuss how the researchers found anonymized ransomware sites on the dark web.

    THN reports "Researchers Share Techniques to Uncover Anonymized Ransomware Sites on Dark Web"

  • news

    Visible to the public "One Billion Chinese Individuals' Data Allegedly Stolen by Hackers"

    A threat actor that has not yet been identified is offering databases containing more than 22 gigabytes of stolen data on approximately 1 billion Chinese residents for 10 bitcoins worth $195,000. The disclosure was made on a hacker forum by a user going by the alias "ChinaDan," who claimed that the data was stolen from the Shanghai National Police (SHGA) databases. They contain names, addresses, national ID numbers, phone numbers, and several billion criminal histories of Chinese people, according to the information supplied on the allegedly stolen material. A sample of 750,000 data records, including details on deliveries, IDs, and police calls, were also made available by ChinaDan. Potential clients could verify the authenticity of the information sold using these documents. The threat actor confirmed the exfiltration of data from a local private cloud provided by Aliyun (Alibaba Cloud), a part of the Chinese police network, also known as the public security network. Binance CEO Zhao Changpeng said that the hack was most likely brought on by an ElasticSearch database that a Chinese government agency mistakenly posted online. This article continues to discuss findings surrounding the recent theft of 1 billion Chinese residents' data by hackers.

    CyberIntelMag reports "One Billion Chinese Individuals' Data Allegedly Stolen by Hackers"

  • news

    Visible to the public "Securing Machine Learning Requires a Sociotechnical Approach"

    Morgan Livingston, an expert focused on Artificial Intelligence (AI) policy, suggests using a sociotechnical approach to leveraging and securing Machine Learning (ML). ML is a critical capability in a defense environment that relies on rapidly converting vast volumes of data and new data sources into information and intelligence. It has numerous applications, including geospatial imaging, enterprise and predictive maintenance, and cybersecurity. ML can help cyber defense by monitoring networks for anomalies that indicate intrusions, detecting malware, discovering vulnerabilities with fuzzing, creating dynamic honeypots, and automating known tasks. Over the last decade, AI research in cybersecurity has exploded, and ML is expected to become a critical technology for businesses to counter nation-state cyberattacks. Although AI can help with cyber defense, it also has offensive applications. AI can scale existing attacks like spear-phishing, discover exploitable software vulnerabilities, improve password brute force attacks, develop self-learning targeted malware, or generate data points that can fool other AI models. Adversarial AI could amplify existing threats, create new threats, and change the nature of threats by scaling impact, driving down costs of attacks, increasing the challenges of attribution, and more. ML introduces technical characteristics that make providing security more difficult. Defenders must always be correct, and attackers must only be correct once. With ML's increased complexity, the potential vulnerabilities multiply. ML systems are vulnerable to both traditional and ML-specific vulnerabilities. The attack surface is broad, encompassing the ML model, ML implementation, software throughout the ML pipeline, and even the hardware. There are inherent flaws in ML systems, not because of error but due to the way AI learns. Attackers can poison training data sets, steal models, and reveal hidden aspects of the training data. ML security is still in its early stages, and research on ML robustness may advance sufficiently to provide security guarantees, similar to how cryptography evolved. However, securing AI will require new approaches, including new test, evaluation, verification, and validation processes. This article continues to discuss ML and AI security challenges and the need for a sociotechnical approach to help defenders mitigate risks.

    SIGNAL Magazine reports "Securing Machine Learning Requires a Sociotechnical Approach"

  • news

    Visible to the public "Publishing Giant Macmillan Still Unable to Process Orders After Ransomware Attack"

    The publishing giant Macmillan is trying to recover from a ransomware attack that prevented it from electronically processing orders. Although no ransomware gang claimed responsibility for the attack, employees took to Twitter to discuss the incident. The ransomware attack resulted in employees not being able to access their emails, files, or company systems. Customers were informed via email by Macmillan's field sales staff that they were unable to handle, receive, place, or ship orders. This is not the first time a library or book publisher has been the target of ransomware. The popular German library service Onleihe, which lets users borrow and rent e-books, electronic newspapers, magazines, audio books, and music from more than 200 libraries throughout Germany, Austria, Switzerland, Italy, Liechtenstein, Denmark, Belgium, and France, was attacked in April by the LockBit ransomware group. This article continues to discuss the impact of and response to the ransomware attack on the US publisher Macmillan and other ransomware incidents faced by book services.

    The Record reports "Publishing Giant Macmillan Still Unable to Process Orders After Ransomware Attack"

  • news

    Visible to the public "Learning to Combat DDoS Attacks"

    Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) attacks on computer systems are a significant concern for those responsible for keeping online services operational and protecting systems and their users. DoS attacks are typically performed with malicious intent or as a protest against a specific service or company. A DDoS attack could also expose security flaws in a system, allowing a third party to extract information such as usernames and passwords while the attack is ongoing. Such attacks may also be random, carried out by botnets, or executed solely for the perpetrator's entertainment with no malicious intent. A team of researchers from the Department of Computer Science and Engineering at DIT University in Uttarakhand reviewed how Machine Learning (ML) can be used to combat DoS and DDoS attacks. This article continues to discuss DoS attacks and the researchers' notes on how ML tools can help combat them.

    Inderscience reports "Learning to Combat DDoS Attacks"

  • news

    Visible to the public "Former Canadian Government IT Worker Pleads Guilty Over NetWalker Ransomware Attacks"

    An ex-Canadian government employee recently pleaded guilty in Florida court to charges of involvement with the NetWalker ransomware group. Sebastien Vachon-Desjardins, 34, was accused of conspiracy to commit computer fraud and wire fraud, as well as intentional damage to a protected computer and transmitting a demand concerning damaging a protected computer. Vachon-Desjardins was extradited in March, following the launch of a US global action against the NetWalker cyber-criminal gang in January. Justice G.P. Renwick stated that between May 2020 and January 2021, the defendant victimized 17 Canadian entities and others worldwide by breaching private computer networks and systems, hi-jacking their data, holding the stolen data for ransom, and distributing stolen data when ransoms were not paid. NetWalker has been active since 2019, with the group offering its malware to threat actors in a ransomware-as-a-service (RaaS) model. According to a 2020 report by McAfee, NetWalker made $25m in just five months in that year. Court documents filed in a district court in Florida claimed the NetWalker group stole a total of 5058 bitcoin in illegal payments (about $40m at the time of the transaction). Sebastien was named "one of the most prolific NetWalker ransomware affiliates" and would be responsible for the extortion of about 1864 bitcoin.

    Infosecurity reports: "Former Canadian Government IT Worker Pleads Guilty Over NetWalker Ransomware Attacks"

  • news

    Visible to the public "Testbed for Experimenting with Industrial IoT and Cybersecurity Integration in Small Manufacturing"

    The Illinois Manufacturing Excellence Center (IMEC) has awarded funding to researchers at Southern Illinois University (SIU) to create a testbed that can be used to experiment with industrial Internet of Things (IoT) devices and cybersecurity integration for manufacturers. SIU will create the Resilient, Adaptive Production leveraging IoT Disruptions (RAPID) testbed to analyze industrial IoT, a new concept in fully connected, transparent, automated, and intelligent factory setup aimed at enhancing the processes and efficiency in manufacturing. The project would provide a sandbox for small and mid-sized manufacturers in Southern Illinois to experiment with smart manufacturing integration. The testbed will serve as a resource for supporting the security and resilience of small and medium-sized manufacturers as they transition to smart manufacturing. This article continues to discuss the support, goals, and development behind the RAPID testbed.

    SIU reports "Testbed for Experimenting with Industrial IoT and Cybersecurity Integration in Small Manufacturing"

  • news

    Visible to the public  "#StopRansomware: MedusaLocker Joint Cybersecurity Advisory"

    The Federal Bureau of Investigation (FBI), the US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA), the Department of the Treasury, and the Financial Crimes Enforcement Network (FinCEN) have released a joint advisory providing information on MedusaLocker ransomware. MedusaLocker actors primarily rely on vulnerabilities in Remote Desktop Protocol (RDP) to gain access to victims' networks. The threat actors encrypt the victim's data and leave a ransom note containing communication instructions in each folder containing an encrypted file. The note instructs victims to send ransom money to a specific Bitcoin wallet address. Based on the observed split of ransom payments, MedusaLocker appears to operate as a Ransomware-as-a-Service (RaaS) model. The developer appears to collect the remaining portion of the MedusaLocker ransom payments, with affiliates receiving 55 to 60 percent of the total. As initial infiltration vectors, the threat actors commonly employ spam and email phishing campaigns that directly attach the ransomware to the email. This article continues to discuss key points made in the joint cybersecurity advisory on MedusaLocker ransomware.

    HSToday reports "#StopRansomware: MedusaLocker Joint Cybersecurity Advisory"

  • news

    Visible to the public "DHS and Israeli Partners Announce Collaboration on Cybersecurity"

    The Science and Technology Directorate (S&T) of the US Department of Homeland Security (DHS), in collaboration with the Israel National Cyber Directorate (INCD), has launched the Israel-US Binational Industrial Research and Development (BIRD) Cyber program, a new joint initiative managed by the BIRD Foundation. The initiative aims to improve the cyber resilience of critical infrastructure in the US and Israel. BIRD Cyber will promote the collaborative development of technologies that mutually benefit both countries and build on the success of the BIRD Homeland Security (HLS) program launched in 2016 in collaboration with the Israel Ministry of Public Security. The first Call for Proposals issued by BIRD Cyber seeks collaborative projects between US and Israeli entities to develop advanced cybersecurity applications for mission-critical cybersecurity needs. There is a need for innovative technologies in the realms of secured architecture for protecting core operational processes, real-time risk assessment solutions for small-to-medium-sized airports or seaports, resilience center pilots for small and medium-sized businesses and enterprises, and advanced data fusion and analytics. This article continues to discuss the purpose and goals of the Israel-US BIRD Cyber program.

    DHS reports "DHS and Israeli Partners Announce Collaboration on Cybersecurity"

  • news

    Visible to the public "Feds Offering $10M Reward For Foreign Election Interference Tips"

    The State Department recently announced that it is offering a reward of up to $10 million for information on foreign interference in U.S. elections. The department stated that it is looking for information leading to the identification or location of "any foreign person, including a foreign entity, who knowingly engaged or is engaging in foreign election interference, as well as information leading to the prevention, frustration or favorable resolution of an act of foreign election interference." The department noted that some examples could include tampering with databases, running bot farm campaigns, or malicious cyber activity. The reward announcement comes ahead of the 2022 midterms, which will determine control of the House and Senate. Funding for the State Department reward comes from the election security fund provided by the 2021 National Defense Authorization Act.

    CBS News reports: "Feds Offering $10M Reward For Foreign Election Interference Tips"

  • news

    Visible to the public "SEC Proposes New Cybersecurity Rules for Public Companies"

    The US Securities and Exchange Commission (SEC) recently proposed new rules for public companies, which standardize event reporting and necessitate regular reporting on cybersecurity policies and procedures. The new rules are intended to better inform investors about a registrant's risk management, strategy, and governance, as well as to provide timely notification of material cybersecurity incidents, according to the SEC. The SEC proposes amendments to require timely reporting of significant cybersecurity incidents. The agency also proposes requiring periodic disclosures about a registrant's cybersecurity policies and procedures, management's role in implementing cybersecurity policies and procedures, and the board of directors' cybersecurity expertise and oversight of cybersecurity risk. If the new cybersecurity rules are passed, companies must report within four business days of discovering a material event. A determination, on the other hand, is not the same as the date of discovery. According to the proposal, reporting cannot be delayed while the company conducts internal investigations. In addition, the proposal includes non-inclusive examples of material events such as an unauthorized incident that jeopardized the confidentiality, integrity, or availability of an information asset (i.e., data, system, or network). Another material event would be one in which an unauthorized party accessed, or a party exceeded authorized access, and altered or stole sensitive business information, personally identifiable information, intellectual property, or information, resulting in, or potentially resulting in, a loss or liability for the registrant. This article continues to discuss the new security rules proposed by the SEC for public companies.

    Security Intelligence reports "SEC Proposes New Cybersecurity Rules for Public Companies"

  • news

    Visible to the public "Researchers Warn of Teen Hacking Group on Discord"

    Security researchers at Avast are urging parents to take a greater interest in their children's online activities after discovering a hacking group on Discord populated by teenagers. The researchers stated that the online community is advertising and sharing malware on the popular messaging platform. The researchers noted that the group advertises easy-to-use malware builders and toolkits so users can DIY their own ransomware, information stealers, and crypto miners. The malware builders require no actual programming, just customization of functions and appearance. It provides an easy entry into this activity and allows kids to prank people and make money. The researchers urged parents to have more honest discussions with their children about the dangers they might encounter in different online spaces. Rather than prohibit actions, they should ask questions to help teens make better-informed decisions. Offensive Security chief strategy officer, Jim O'Gorman, argued that a talent for hacking could be refocused into a positive outcome for the teens involved and the cybersecurity industry. Earlier this year, a report from the UK's National Crime Agency (NCA) claimed that children as young as nine had launched DDoS attacks thanks to easy-to-use online services. It revealed a 107% increase in reports to police of students deploying DDoS attacks from 2019 to 2020.

    Infosecurity reports: "Researchers Warn of Teen Hacking Group on Discord"

  • news

    Visible to the public "Research Shows Data Security Tools Fail Against Ransomware 60 Percent Of the Time"

    Although more than 70 percent of firms have a combination of prevention, detection, and recovery solutions in place, nearly 40 percent of them have experienced ransomware attacks in the past year, according to a report from the data security company Titaniam Inc. Findings show that 60 percent of the time, traditional data security tools such as secure backup and recovery tools, encryption at rest and in transit solutions, tokenization, and data masking fall short of protecting organizations' data against ransomware threats. The research emphasizes that enterprises must be able to encrypt data-in-use to deter malicious actors in their tracks because they cannot afford to rely solely on conventional data security measures to protect themselves from data exfiltration and double extortion ransomware attacks. The issue with traditional data security tools is not that they lack robust security measures but that attackers can circumvent these controls by stealing credentials and gaining privileged access to critical data assets. Therefore, organizations are encouraged to deploy data security solutions with encryption-in-use to defend against the intrusions typical of modern ransomware attacks. This type of encryption can help obscure data so that attackers cannot exfiltrate it with privileged access to enterprise resources. This article continues to discuss key findings from Titaniam's State of Data Exfiltration and Extortion Report.

    VB reports "Research Shows Data Security Tools Fail Against Ransomware 60 Percent Of the Time"

  • news

    Visible to the public "Cyberattack Disrupts Unemployment Benefits in Some States"

    A recent cyberattack on a software company has disrupted unemployment benefits and job seeking assistance for thousands of people in several states. The cyberattack occurred at Geographic Solutions Inc. and affected the website for unemployment benefits for Tennessee. Currently, some 12,000 Tennesseans are not getting their unemployment payments because of the cyberattack. Geographic Solutions stated that initial investigation findings indicate that no personal data was accessed and no data was removed from its network operations center. Unemployment websites in several other states were affected too. In Louisiana, people seeking to file unemployment online are directed instead to use a call center instead. The website to file claims in Nebraska was taken offline, and the state said it did not have an exact timeline for when it would be back up. Currently, it is not clear how many states are affected or if the cyberattack was a ransomware attack. The company's clients include more than 35 states and territories. Some state-run job seeking sites were also taken offline because of the attack, including Tennessee's. Florida and Nebraska job-seeking sites were also down. Allan Liska, an intelligence analyst at the cybersecurity firm Recorded Future, said an attack affecting those who have lost their jobs from obtaining unemployment benefits is a stark reminder of the enormous effects cybercrime can have.

    SecurityWeek reports: "Cyberattack Disrupts Unemployment Benefits in Some States"

  • news

    Visible to the public "Jenkins Discloses Dozens of Zero-Day Bugs in Multiple Plugins"

    The Jenkins security team has disclosed 34 security vulnerabilities impacting 29 plugins for the Jenkins open-source automation server, with all of them being zero-days remaining unpatched. Jenkins is a widely used platform, with support for more than 1,700 plugins, used by enterprises worldwide for software building, testing, and deployment. The CVSS base scores of the zero-days range from low to high severity, and the impacted plugins have over 22,000 installs, according to Jenkins statistics. The full list of flaws that have yet to be patched includes Cross Site Scripting (XSS), Stored XSS, Cross-Site Request Forgery (CSRF) bugs, missing or incorrect permission checks, as well as passwords, Application Programming Interface (API) keys, and tokens stored in plain text. Most of the high severity zero-days require user interaction to be exploited in low complexity attacks by remote attackers with low privileges. According to Shodan data, over 144,000 Jenkins servers are currently accessible via the Internet and could be the target of attacks if they are using unpatched plugins. This article continues to discuss the potential exploitation and impact of the zero-day bugs discovered in 29 plugins for the Jenkins open-source automation server.

    Bleeping Computer reports "Jenkins Discloses Dozens of Zero-Day Bugs in Multiple Plugins"

  • news

    Visible to the public "New 'SessionManager' Backdoor Targeting Microsoft IIS Servers in the Wild"

    A newly discovered malware dubbed SessionManager has been used in the wild since at least March 2021 to backdoor Microsoft Exchange servers belonging to various entities worldwide, with infections still present in 20 organizations as of June 2022. After exploiting one of the ProxyLogon flaws in Exchange servers, SessionManager masquerades as a module for Internet Information Services (IIS), a web server software for Windows systems. Those that have been targeted by SessionManager include 24 different NGOs, government, military, and industrial organizations across Africa, South America, Asia, Europe, Russia, and the Middle East. A SessionManager variant has compromised a total of 34 servers to date. SessionManager, which is referred to as a "lightweight persistent initial access backdoor," can read, write, and delete arbitrary files, as well as run server-side binaries and establish communications with other endpoints within a network. The malware also serves as a covert channel for reconnaissance, gathering in-memory passwords, and delivering additional tools such as Mimikatz and an Avast memory dump utility. This article continues to discuss findings surrounding the capabilities and techniques of the SessionManager backdoor.

    THN reports "New 'SessionManager' Backdoor Targeting Microsoft IIS Servers in the Wild"

  • news

    Visible to the public "Toll Fraud Malware Turns Off Wi-Fi And Pushes Premium Subscriptions"

    One of the most common Android risks, toll fraud malware, is expanding with capabilities that enable automated membership to premium services, according to a Microsoft warning. In toll fraud, a subset of billing fraud, the threat actor tricks victims into calling or texting a premium number. Toll fraud, on the other hand, requires a mobile operator's network connection because it cannot operate over Wi-Fi. Microsoft has provided technical information on how Android users can protect themselves from toll fraud software. Toll fraud is carried out using the Wireless Application Protocol (WAP), which allows customers to subscribe to premium content and charge the fee to their phone bill. The consumer must click a subscription button to connect via the mobile network. In addition, some services request that users confirm their choice by sending a one-time password (OTP). The fraudulent subscription is initiated, OTPs are intercepted, and warnings that would otherwise alert the victim are suppressed by the malware that facilitates toll fraud. Toll fraud malware authors often include features that make the harmful activity as covert as possible. If the infected device's mobile network is not on the list, one option is to keep the infection dormant. Another approach is to use dynamic code loading, which allows some code to load only under certain conditions. This makes detecting the infection more difficult, especially when using static analysis. This article continues to discuss the phases, process, capabilities, and mitigation of toll fraud malware.

    CyberIntelMag reports "Toll Fraud Malware Turns Off Wi-Fi And Pushes Premium Subscriptions"

  • news

    Visible to the public "18 Zero-Days Exploited So Far in 2022"

    So far, 18 security vulnerabilities have been exploited as unpatched zero-days in the wild this year, with half of them being preventable flaws. Nine of the flaws were updated versions of vulnerabilities that had already been patched, with four of them being updates to zero-day bugs that had already been discovered in the wild in 2021. The idea that zero-day exploits are so sophisticated that defenders cannot hope to catch them is refuted by the fact that these are closely related to security flaws that have already been observed, according to Google Project Zero's Maddie Stone. Attackers used a variant of the original bug after the original in-the-wild zero-day vulnerability was patched. A large portion of the 2022 in-the-wild zero-days results from the prior vulnerability's incomplete patching. Apple iOS, Atlassian Confluence, Chromium, Google Pixel, Linux, WebKit, and Windows are among the platforms affected by the 2022 zero-days (including the Follina and PetitPotam vulnerabilities). This article continues to discuss the zero-days discovered in 2022 so far and the importance of forcing attackers to start from scratch.

    Dark Reading reports "18 Zero-Days Exploited So Far in 2022"

  • news

    Visible to the public  "Cyber, Social Sciences Faculty Collaborate to Study Social Media Attacks With $500K Grant"

    Dr. Ahmed Aleroud, associate professor in the Augusta University School of Computer and Cyber Sciences and grant principal investigator, has been awarded a three-year grant totaling $500,622 by the Office of Naval Research's Social Networks and Computational Social Science Program for a project aimed at creating new algorithms to mitigate social cyberattacks. According to faculty members, this project will have a significant impact on cybersecurity intelligence and digital forensics research. In the age of social media, cyberattacks on social media are conducted by one or more actors, including bots and human users. These actors enlist the help of other users to create influence campaigns to polarize topic-oriented groups using various content-based and centrality-based intentional cyber-mediated methods. In order to detect and evaluate the effects of such attacks, including on images, videos, and other multimedia content, this project will investigate current deep-learning techniques like adversarial models. Recent studies have indicated that misinformation spreads in 25 different languages, leading to deaths and injuries. Studies have also revealed several attempts to undermine the power of US governmental institutions by spreading misinformation on social media. One of the world's top ten most spoken languages, Arabic, will be the project's focus. Although some researchers have explored various language-based attacks in Arabic, there has not been much research done on social media attacks and how they affect the targeted nations, including the US. The project will develop a new computational framework for analyzing and mitigating social cyberattacks in Arabic-speaking countries, including Syria, Lebanon, Saudi Arabia, Iraq, Egypt, and Jordan. The framework will be driven by approaches from social network analysis, data mining, Machine Learning (ML), Natural Language Processing (NLP), graph mining, and more. It will also involve graph centrality and language models to measure how stories are developed to create topic-oriented communities in Arabic social media. This article continues to discuss the goals and support behind the study on social media cyberattacks.

    Augusta University reports "Cyber, Social Sciences Faculty Collaborate to Study Social Media Attacks With $500K Grant"

  • news

    Visible to the public "New DARPA-Funded Blockchain Study Points Out Exploits of Security"

    According to a recent study by consulting firm Trail of Bits, supported by the US Defense Advanced Research Projects Agency (DARPA), blockchains are not impenetrable despite claims to the contrary and can be compromised using unethical methods. Blockchains and other forms of distributed ledger technology are becoming more common, but researchers found that the security that was assumed to be offered by these systems' lack of centralized control and claimed imperviousness to change was not all that it seemed. Malicious actors had other ways outside simply altering the characteristics of a blockchain's implementation, networking, or consensus protocol, even when the cryptographic components of the systems were more or less secure. The DARPA program manager overseeing the study, Joshua Baron, said the findings demonstrate the need for a thorough evaluation when assessing emerging technologies, such as blockchains, as they expand in society and the economy. The report covered the core characteristics of blockchains and looked at the cybersecurity risks that come with them. The holistic study revealed that some Bitcoin nodes constitute a weak link. Crawls of the Bitcoin network revealed that 21 percent of nodes are using a vulnerable outdated version of the Bitcoin Core client. While software flaws can result in consensus failures, researchers showed that overt software changes could also affect the blockchain's current state. Therefore, the central point of trust in the blockchain system--its core developers and maintainers--is vulnerable to targeted attacks. The report's authors pointed out that a small group of blockchain participants could gain excessive, centralized control over the entire system. This article continues to discuss the DARPA-supported study on blockchain security.

    Homeland Preparedness News reports "New DARPA-Funded Blockchain Study Points Out Exploits of Security"

  • news

    Visible to the public "IC3 Issues Warning on Deepfake Use in Remote Work Applications"

    The FBI's Internet Crime Complaint Center (IC3) issued a warning about the use of deepfakes and stolen Personally Identifiable Information (PII) by individuals seeking remote work positions. According to the FBI, the fraudulent activity targets IT jobs, as well as software and database management and computer programming positions. Complaints to IC3 detailed tactics such as voice spoofing and potential voice deepfakes used during online interviews with job candidates. Some applicants also used stolen PII to try to get a remote position. Stolen PII was intercepted during the pre-employment background check stage of the job applications. Security teams should be on the lookout for insider threats within their networks as deepfakes and stolen PII tactics have been focusing on positions with high levels of access privileges to enterprise systems. This article continues to discuss IC3's warning regarding the use of stolen PII and deepfakes to apply for remote work.

    Security Magazine reports "IC3 Issues Warning on Deepfake Use in Remote Work Applications"

  • news

    Visible to the public "Google Launches Advanced API Security to Combat API Threats"

    Google has released a preview version of Advanced API Security, a service designed to assist organizations in combating growing threats targeting Application Programming Interfaces (APIs). The service, which is built on the API management platform Apigee acquired by Google in 2016, aims to make it easier to identify API proxies that do not meet security standards. Advanced API Security's key features include the detection of bots and the identification of API misconfigurations. To detect API misconfigurations, the platform scans APIs regularly and provides remediation actions that organizations can take if misconfiguration issues are discovered. This can help reduce security risks to sensitive information, such as patient information found in APIs related to medical coverage information from a healthcare provider. API security teams can also use the pre-configured rules in Advanced API Security to detect malicious bots in API traffic, each representing a different type of unusual traffic from a single IP address. Advanced API Security flags an API traffic pattern as a bot if it matches any of the rules. This service is aimed at financial institutions, which rely heavily on Google Cloud--four of the top five US banks, according to the Federal Reserve, are already using Apigee. The service also accelerates the process of identifying data breaches by identifying bots that returned the HTTP 200 OK success status response code. This article continues to discuss Google's Advanced API Security service as well as how business logic flaws are the root of most API attacks.

    Security Boulevard reports "Google Launches Advanced API Security to Combat API Threats"

  • news

    Visible to the public "CISA Releases Guidance on Switching to Modern Auth in Exchange Online Before October 1"

    The US Homeland Security Department's Cybersecurity and Infrastructure Security Agency (CISA) has published guidance for transitioning from Basic Authentication ("Basic Auth") in Microsoft Exchange Online to Modern Authentication ("Modern Auth") before Microsoft permanently disables Basic Auth on October 1, 2022. Basic Auth is a legacy authentication method that does not support multi-factor authentication (MFA), which is required by Executive Order 14028, "Improving the Nation's Cybersecurity," for Federal Civilian Executive Branch (FCEB) agencies. Although this guidance is intended for FCEB agencies, CISA encourages all organizations to switch to Modern Auth and enable MFA before October 1. CISA urges all organizations to review Switch to Modern Authentication in Exchange Online Before Basic Authentication Deprecation and prioritize moving to Modern Auth. This article continues to discuss new guidance on switching to Modern Auth in Microsoft Exchange Online.

    HSToday reports "CISA Releases Guidance on Switching to Modern Auth in Exchange Online Before October 1"

  • news

    Visible to the public "Cyber Command Yearns for More Private Sector Threat Sharing"

    In order to strengthen defensive capabilities and share threat information with the government, US Cyber Command (USCYBERCOM) wants more technology organizations on the front lines of the international cybersecurity effort. USCYBERCOM distributes information about cybersecurity, but according to Cyber Command Executive Director Dave Frederick, the organization needs more private companies to thoroughly report cybersecurity issues so that Cyber Command can learn from them. Additionally, Fredrick underlined that Cyber Command views cyberspace as a team effort and that cooperation is the only way effective cyber defense can be achieved. Frederick also highlighted the organization's continued emphasis on information sharing and collective defense measures with the Defense Industrial Base (DIB) and the US telecommunications industry. Cyber Command's priorities include leveraging Artificial Intelligence (AI)/Machine Learning (ML) to help exploit big data, enhancing the protection of Defense Department (DoD) weapons systems, and more. This article continues to discuss the need for more private sector threat sharing as well as Cyber Command's priorities.

    MeriTalk reports "Cyber Command Yearns for More Private Sector Threat Sharing"

  • news

    Visible to the public "North Korean Hackers Suspected to be Behind $100M Horizon Bridge Hack"

    Based on comparisons to the Ronin bridge attack in March 2022, the North Korean-backed Lazarus Group is thought to be responsible for the recent $100 million cryptocurrency theft from Harmony Horizon Bridge. The discovery comes after Harmony announced that a hack had occurred last week on its Horizon Bridge platform, which enables users to transfer cryptocurrency across different blockchains. On June 23, the exploiter conducted a number of transactions to extract tokens housed in the bridge, and they later made off with around $100 million in bitcoin. Ether (ETH), Tether (USDT), Wrapped Bitcoin (WBTC), and BNB were among the stolen cryptocurrency assets, according to a recent study from blockchain analytics firm Elliptic. Days later, on June 27, the perpetrator allegedly started transferring cash totaling $39 million through the Tornado Cash mixer service in an effort to conceal the illicit proceeds and confuse the transaction trail leading back to the initial theft. Elliptic claimed it was in a position to further follow the stolen monies transferred through the service to a number of new Ethereum wallets after being able to "demix" the transactions. The company's attribution to the Lazarus Group stems from the threat actor's history of carrying out cryptocurrency thefts, including those targeting cross-chain bridges earlier this year, and how the funds were stolen and subsequently laundered. The heist was performed by compromising the multi-signature wallet's cryptographic keys, perhaps through social engineering attacks against Harmony team members. This article continues to discuss the Horizon Bridge hack and why Lazarus Group is suspected of having been behind it.

    THN reports "North Korean Hackers Suspected to be Behind $100M Horizon Bridge Hack"

  • news

    Visible to the public "NATO to Create Cyber Rapid Response Force, Increase Cyber Defense Aid to Ukraine"

    During the NATO summit, NATO announced its plans to create a rapid response cyber force and that it plans to bolster military partnerships with civil society and industry to respond to cyber threats. During the summit, it was decided that NATO will build and exercise a virtual rapid response cyber capability to respond to significant malicious cyber activities. NATO also declared that it would do more to support Ukraine's cyber resilience and defense against Russia. NATO also said they will focus on China as a long-term and mounting cyberthreat. The plan is to significantly strengthen NATO's cyber defenses through enhanced civil-military cooperation. NATO will also expand partnerships with industry. Christ Painter, the former top cyber official in President Barack Obama's State Department, stated that the new declaration is significant for its enhanced focus on cybersecurity. Painter noted that "cyber is now part and parcel of both the threat and the response that NATO is looking at, and that it's no longer some foreign object."

    Cyberscoop reports: "NATO to Create Cyber Rapid Response Force, Increase Cyber Defense Aid to Ukraine"

  • news

    Visible to the public "Bank of the West Customers Hit by ATM Skimmer Attack"

    A series of suspicious cash withdrawal attempts from a bank with locations across the US revealed a number of ATM devices used to steal customer account information. An investigation revealed that a number of customers' debit card numbers, related PINs, and perhaps names and addresses had been hacked. The stolen data might have been used to make fake debit cards and make withdrawal attempts from accounts belonging to actual customers. According to bank Chief Operating Officer Karl Werwath, a "limited number of ATMs" had skimmers implanted by unidentified fraudsters. Over the past two decades, the threat of ATM skimming has increased as criminals have learned to install difficult-to-detect electronic devices onto ATMs, such as fake card readers and keyboards that capture payment card data. Some data suggests that, while still harmful, skimming attacks are becoming less common. However, ATMs remain a popular target for thieves, whose tactics range from transaction reversal fraud to physically prying the cash box open. According to data from the most recent IBM X-Force Threat Intelligence Index Report, the financial sector was the target of 22.4 percent of cyberattacks in 2021, with 70 percent of those attacks targeting banks, 16 percent targeting insurance companies, and 14 percent targeting other financial organizations. This article continues to discuss the ATM skimmer attack on Bank of the West customers, mitigation measures, and the persistent targeting of the financial sector by cybercriminals.

    DataBreachToday reports "Bank of the West Customers Hit by ATM Skimmer Attack"

  • news

    Visible to the public "Google Blocked Dozens of Domains Used by Hack-For-Hire Groups"

    A large number of malicious domains and websites used by hack-for-hire groups against high-risk organizations around the world have been blocked by Google's Threat Analysis Group (TAG). Hack-for-hire operators are directly involved in attacks and are typically employed by a company providing such services, in contrast to commercial surveillance vendors whose products are deployed in attacks by clients. They may occasionally engage as "freelance" threat actors. Clients who lack these talents or who wish to remain anonymous in the event that the attacks are discovered and detected, employ them for their hacking abilities. Hack-for-hire groups go after individuals and organizations in data theft and corporate espionage campaigns, with past victims including politicians, journalists, human rights and political activists, and other high-risk users globally. In contrast to many government-backed operations, which often have a clearer delineation of mission and targets, hack-for-hire campaigns have a broader range of targets. For example, an Indian hack-for-hire operator was recently observed targeting an IT company in Cyprus, an education institution in Nigeria, a fintech company in the Balkans, and an Israeli shopping company. Google TAG is currently tracking multiple hack-for-hire firms and their campaigns in several countries, including India, Russia, and the United Arab Emirates. This article continues to discuss hack-for-hire groups and the recent takedown of domains used by such groups.

    Bleeping Computer reports "Google Blocked Dozens of Domains Used by Hack-For-Hire Groups"

  • news

    Visible to the public "Ukrainian Cops Bust Multimillion-Dollar Phishing Gang"

    Ukrainian "cyber-police" recently arrested nine alleged members of a prolific phishing gang that made 100 million hryvnias ($3.4m) by luring locals with the promise of financial support from the EU. Digital experts teamed up with Pechersk Police Department officers and specialists from the National Bank of Ukraine (NBU) to crack the case. The nine arrested individuals are accused of building and operating over 400 phishing sites that requested victims enter their bank account and card details in order to apply for social welfare payments from the EU. Once they received the data, the gang would use it to hijack users' accounts and transfer their funds. According to the NBU, over 5000 victims were scammed this way, earning the fraudsters millions. The police also seized computer equipment, mobile phones, bank cards, and money obtained by criminal means while arresting the individuals. Those arrested face 15 years behind bars if found guilty. They have been accused of fraud and unauthorized interference in the work of IT systems and networks.

    Infosecurity reports: "Ukrainian Cops Bust Multimillion-Dollar Phishing Gang"

  • news

    Visible to the public "Nevadan Arrested for Alleged $45m Metaverse Investment Fraud"

    A man was recently arrested in Los Angeles on suspicion of masterminding a multimillion-dollar investment fraud scheme that tricked over 10,000 victims. Neil Chandran, 50, of Las Vegas, was charged with three counts of wire fraud and two counts of engaging in monetary transactions in criminally derived property. According to the Department of Justice (DoJ), Chandran owned several technology companies marketed to investors as promising high returns as they were about to be acquired by a consortium of prominent business figures. Chandran allegedly claimed that investor funds would be used for normal expenses to keep the companies operating until they were purchased. The indictment alleges that Chandran forced others to make false and misleading representations to investors, including that the firms were about to be purchased by billionaire investors and that any funds plowed into the companies would be used to keep them operating until they were bought. The DoJ stated that no such buyer group was about to purchase the companies for the claimed returns, and a substantial portion of the funds were misappropriated for other business ventures and the personal benefit of Chandran and others, including the purchase of luxury cars and real estate. The DoJ also noted that no prominent billionaires were involved in purchasing Chandran's companies. Currently, proceeds of the alleged fraud are being seized by the FBI. These 100 assets include bank accounts, real estate, and luxury vehicles. The companies in question operated under the "ViRSE" brand and included Free Vi Lab, Studio Vi, ViDelivery, ViMarket, and Skalex USA. The DoJ stated that companies were marketed as developing virtual world technologies for use in the company's metaverse, including its own cryptocurrency. The FBI noted that investment fraud was among the highest-earning cybercrime types last year. The 20,600 cases reported to the FBI in 2021 made scammers nearly $1.5bn.

    Infosecurity reports: "Nevadan Arrested for Alleged $45m Metaverse Investment Fraud"

  • news

    Visible to the public "Israel Plans 'Cyber-Dome' to Defeat Digital Attacks From Iran and Others"

    The new head of Israel's National Cyber Directorate (INCD) has announced that the country plans to construct a "Cyber-Dome," a national defense system to combat digital attacks. Gaby Portnoy, the director general of INCD, revealed plans for Cyber-Dome in his first public speech since being appointed to the position in February. The Cyber-Dome will improve Israel's cybersecurity by incorporating new mechanisms into the national cyber perimeter, reducing the harm caused by large-scale cyberattacks. It will also provide tools and services to improve the overall security of national assets. The Dome is a new big data, Artificial Intelligence (AI), and overall proactive defense approach. It will synchronize national-level real-time threat detection, analysis, and mitigation. This article continues to discuss the purpose and plans behind Israel's Cyber-Dome.

    The Register reports "Israel Plans 'Cyber-Dome' to Defeat Digital Attacks From Iran and Others"

  • news

    Visible to the public "Evaluating The Use of Encryption Across The World’s Top One Million Sites"

    A new study conducted by security researcher and TLS expert Scott Helme evaluates the use of encryption across the world's top one million sites over the last six months. The study data reveals the need for a control plane to automate the management of machine identities in increasingly complex cloud environments. Helme stated that the data suggests progress has been made in some areas, but more education is needed to ensure that machine identities are used in the most effective way to protect the online world. Helme discovered that the use of TLSv1.2 has declined by 13% over the last six months, with v1.3 in use by almost 50% of sites, more than twice as many sites as v1.2. Helme stated that even though organizations are adopting stronger TLS protocols, they are failing to couple this with a move to stronger keys for TLS machine identities. Helme noted that industry-standard ECDSA keys are now used by just 17% of websites, up from 14% six months ago. Helme stated that 39% of the top one million websites still use slower, less secure RSA keys. Helme also found that growth in the adoption of HTTPS has plateaued at 72%, the same level as in December. Kevin Bocek, VP at Venari, stated that the recent boom in cloud migration means every business needs many more TLS machine identities to secure communication between devices, clouds, software, containers, and APIs.

    Help Net Security reports: "Evaluating The Use of Encryption Across The World's Top One Million Sites"

  • news

    Visible to the public "EMEA Continues to Be a Hotspot for Malware Threats"

    According to the most recent Internet Security Report from the WatchGuard Threat Lab, ransomware detections in the first quarter of this year surpassed the total number reported for 2021. Researchers also discovered that the notorious Log4Shell vulnerability tripled its attack attempts, the Emotet botnet made a strong comeback, and malicious cryptomining activity increased. Despite data from the Threat Lab's Q4 2021 report showing a downward trend in ransomware attacks year over year, everything changed in Q1 2022 with a huge spike in ransomware detections. While the notorious REvil cybergang was brought to justice in Q4 2021, according to WatchGuard analysis, this may have opened the door for the LAPSUS$ extortion group to appear. This, along with numerous new ransomware variants like BlackCat, the first known ransomware written in the Rust programming language, may have contributed to the rise of ransomware and cyber-extortion as a threat type. The data also indicates that EMEA is still a major hub for malware threats. WatchGuard Fireboxes in EMEA were affected more than those in North, Central, and South America (AMER), with 57 percent and 22 percent, respectively, followed by Asia-Pacific (APAC) at 21 percent, according to regional detections of basic and evasive malware. This article continues to discuss key findings from WatchGuard Threat Lab's latest Internet Security Report.

    Help Net Security reports "EMEA Continues to Be a Hotspot for Malware Threats"

  • news

    Visible to the public "Brocade Vulnerabilities Could Impact Storage Solutions of Several Major Companies"

    Broadcom recently discovered that some of the software provided by its storage networking subsidiary Brocade is affected by several vulnerabilities, and it seems possible that the flaws could impact the products of several major companies. According to Broadcom, the Brocade SANnav storage area network (SAN) management application is affected by nine vulnerabilities. Patches have been made available for these security holes. Six of the vulnerabilities impact third-party components such as OpenSSL, Oracle Java, and NGINX, and they have been rated "medium severity" or "low severity." The company noted that exploiting these flaws can allow an attacker, in many cases an unauthenticated attacker, to manipulate data, decrypt data, and cause a denial of service (DoS) condition. The remaining three vulnerabilities are specific to Brocade SANnav and have been assigned a "high" severity and risk impact rating. The company noted that they can allow attackers to obtain switch and server passwords from log files and intercept potentially sensitive information due to static key ciphers. The security bugs (CVE-2022-28167, CVE-2022-28168, and CVE-2022-28166) were discovered internally, and there is no evidence of exploitation in the wild. Organizations are urged to download the latest updates in order to mitigate the vulnerabilities.

    SecurityWeek reports: "Brocade Vulnerabilities Could Impact Storage Solutions of Several Major Companies"

  • news

    Visible to the public "Almost Half of UK Organizations Now Encrypt All Their Data"

    According to a new report, the growing threat of data breaches and ransomware is prompting more UK businesses to encrypt all of their data. The report, from hardware-encrypted USB drive maker Apricorn, is based on a Vanson Bourne survey of 100 UK IT decision-makers, which found that 47 percent now require encryption of all data at rest and in transit. Of the organizations, 32 percent encrypt all data stored on their systems or in the cloud. Only 2 percent do not consider encryption to be a priority at this time. A lack of encryption has been identified as the primary cause of a data breach in 16 percent of the IT leaders polled, up from 12 percent in 2021. A rise in remote working is also cited by 24 percent as a motivator for more encryption. This article continues to discuss key findings from the study regarding the increased prioritization of data encryption among organizations in the UK.

    BetaNews reports "Almost Half of UK Organizations Now Encrypt All Their Data"

  • news

    Visible to the public "'8220' Malware Gang to Compromise Linux Systems and Install Cryptomining Malware"

    Microsoft reported discovering notable updates to malware designed to install cryptominer malware on Linux servers. Microsoft has cited recent work from the "8220" group, which was recently spotted exploiting the critical bug affecting Atlassian Confluence Server and Data Center. Over the last year, the group has actively updated its techniques and payloads. The most recent campaign targets i686 and x86 64 Linux systems, gaining access via RCE exploits for CVE-2022-26134 (Confluence) and CVE-2019-2725 (WebLogic). The updates include the deployment of new versions of a cryptominer and an IRC bot, as well as the use of a recently disclosed vulnerability exploit. According to Cisco's Talos Intelligence group, the 8220 gang has been active since 2017, and it is a Chinese-speaking, Monero-mining threat actor whose C2s frequently communicate over port 8220. They were targeting Apache Struts2 and Docker image vulnerabilities to compromise enterprise servers. This article continues to discuss recent updates made to the 8220 malware.

    ZDNet reports "'8220' Malware Gang to Compromise Linux Systems and Install Cryptomining Malware"

  • news

    Visible to the public "MaliBot Financial Malware Is a Master of Disguise, Targets Android Users"

    MaliBot malware is a Trojan-like software that, when downloaded onto a user's device, steals banking credentials, other legitimate sensitive financial information, cookies, call logs, texts and application addresses, and even Google account credentials (thereby allowing the malware to sidestep two-factor authentication). It is thought to be related to the well-known FluBot malware, which has long been attacking banking apps in some way, according a study written by F5 Labs. This article continues to discuss the discovery, distribution, and capabilities of the MaliBot malware.

    SC Media reports "MaliBot Financial Malware Is a Master of Disguise, Targets Android Users"

  • news

    Visible to the public "Norway Hit With Cyberattack, Temporarily Suspending Service"

    Norway's public and private sector websites were temporarily down on Wednesday following a cyberattack that targeted the country's national data network, forcing it to suspend online services for several hours. Sofie Nystrom, head of the Norwegian National Security Authority (NSM), stated that a criminal pro-Russian group seemed to be behind the hacks. Jonas Gahr Store, Norwegian Prime Minister, said that he believed the denial-of-service (DDOS) attack had not "caused any significant damage." The cyberattack on Norway comes two days after Lithuania reported a similar hack that targeted public and private institution websites. Killnet, a Russian-backed hacking group, claimed responsibility for the hack against Lithuania. After the cyberattacks that affected Lithuania, a Lithuanian official warned that "more intense attacks" are expected in the coming days, including ransomware and website defacement.

    The Hil reports: "Norway Hit With Cyberattack, Temporarily Suspending Service"

  • news

    Visible to the public "Cyberattacks via Unpatched Systems Cost Orgs More Than Phishing"

    Security researchers at Tetra Defense have discovered that attackers continue to find significant success targeting unpatched servers and vulnerable remote-access systems. These compromises cost victim organizations 54% more than compromises caused by user actions (i.e., falling for phishing and opening malicious documents). The security researchers analyzed incident data from the first quarter and found that unpatched vulnerabilities and risky services, such as Remote Desktop Protocol (RDP), account for 82% of successful attacks, while social engineering accounted for just 18% of successful compromises. The ProxyShell exploit for Microsoft Exchange servers accounted for about a third of external breaches, while insecure Remote Desktop Protocol (RDP) servers accounted for a quarter. The researchers noted that while the Log4Shell bug continued to see a great deal of media coverage, the attack vector was only used in 22% of breaches. During the study, the researchers also found that healthcare topped the list of targeted industries, with nearly 20% of compromised organizations falling in that category. Finance and education tied for second at 13%, and manufacturing accounted for 12% of incidents. Tetra Defense also tracked the cybercrime actors responsible for most breaches and found that four groups, Lockbit 2.0, BlackCat, Conti, and Hive, are responsible for about half of all compromises investigated by the firm. The researchers noted that two controls, comprehensive patching and using multifactor authentication (MFA), could have prevented nearly 80% of the investigated incidents. That includes 57% of external compromises that used an unpatched vulnerability and the 13% of successful attacks on virtual private networks that either exploited a vulnerability or used stolen credentials to gain access where MFA was not enabled.

    Dark Reading reports: "Cyberattacks via Unpatched Systems Cost Orgs More Than Phishing"

  • news

    Visible to the public Pub Crawl #63


    Pub_Crawl_web.jpgPub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers.

  • news

    Visible to the public "Cybersecurity in the Pacific: How Island Nations Are Building Their Online Defenses"

    Researchers at Monash University and the Oceania Cyber Security Centre (OCSC) are working with Pacific governments to assess their current cybersecurity situations and make recommendations for the path ahead. Leaders from several Pacific nations recently met in Fiji to strengthen ties and promote regional unity. The Pacific faces numerous challenges, including the threat of climate change and the competition for influence in the region among major powers. Despite these challenges, Pacific countries have demonstrated tenacity in preserving their own and the region's identity and sovereignty. The Pacific Islands Forum's 18 member states signed the Boe Declaration on Regional Security in 2018, which outlines an expanded concept of security that includes cybersecurity. The declaration established cybersecurity as a shared priority for the region. As online services and remote work have grown in popularity in response to the COVID-19 pandemic, the stakes have risen even higher. Cybersecurity will be required to sustain economic development in the face of natural disasters, changes in the global security situation, and global economic upheavals. Pacific Island countries rely on fragile undersea cables for broadband Internet access. Placing government processes online, modernizing digital infrastructure, and encouraging e-commerce will increase security risks. Pacific nations may wish to maintain sovereign control over their data while securing their digital spaces. Data is often controlled outside the country as a result of digitization. The introduction of digital currencies and mobile payments may also weaken a country's control over its monetary policies. Working with overseas cybersecurity suppliers may require the country to hand over access to sensitive data, networks, and systems. The team is using the University of Oxford's Cybersecurity Capacity Maturity Model for Nations (CMM) and their own studies to help Pacific Island countries assess their current posture, identify what to prioritize, and determine how to bolster local capacity and sovereign capability. They are developing a regional framework for island state cybersecurity, which will help such countries build effective emergency response teams, strengthen cyber resilience, and ensure data sovereignty. This article continues to discuss cybersecurity in the Pacific and efforts to help island nations bolster their online defenses.

    The Conversation reports "Cybersecurity in the Pacific: How Island Nations Are Building Their Online Defenses"

  • news

    Visible to the public "New Cybersecurity Tool Covers Some Yawning Website Gaps"

    A new and simple scanning tool has revealed some flaws in widely used web cybersecurity programs. The tool also demonstrates how these flaws can be addressed. Websites and web applications have recently become a popular target for cybercriminals resulting in an increasing number of commercial scanners designed to detect vulnerabilities in website architecture. According to Dr. Yousef Amer, a mechanical and systems engineer at the University of South Australia, and part of the international team of researchers who built the new tool, the group has identified that most of the publicly available scanners contain vulnerabilities and are not doing what they are intended to do. The researchers assessed 11 publicly available web scanners against the "OWASP Top Ten," which lists the 10 most critical cybersecurity risks to web applications. The researchers developed a prototype tool to counter all these vulnerabilities. It is described as a black box security assessment tool that finds vulnerabilities in a website by trying to break in from the outside. This article continues to discuss the new cybersecurity tool that covers website vulnerabilities.

    Cosmos Magazine reports "New Cybersecurity Tool Covers Some Yawning Website Gaps"

  • news

    Visible to the public "New UnRAR Vulnerability Could Lead to Zimbra Webmail Hack"

    Security researchers at Sonar have discovered a new flaw in RARlab's UnRAR utility that could be exploited to steal emails from individual Zimbra mail user accounts. The path traversal vulnerability, found in the Unix versions of UnRAR, has been assigned CVE-2022-30333 and a base score of 7.5 in the Common Vulnerability Scoring System (CVSS). Zimbra is an enterprise email solution used by over 200,000 businesses, government, and financial institutions. The researchers stated that the flaw would allow an attacker to create files outside the target extraction directory when an application or victim user extracts an untrusted archive. The researchers noted that if an attacker can write to a known location, they are likely to be able to leverage it in a way leading to the execution of arbitrary commands on the system. According to the researchers, successful exploitation would give attackers access to all emails sent and received on a compromised email server. The researchers stated that the only requirement for this attack is that UnRAR was installed on the server, which researchers said would be likely as it is required for RAR archive virus scanning and spam-checking. The researchers reportedly warned RarLab about the flaw on May 04, and the company released a patch on May 06 as part of version 6.12. The vulnerability does not impact other versions of the software, including those for Windows and Android operating systems.

    Infosecurity reports: "New UnRAR Vulnerability Could Lead to Zimbra Webmail Hack"